scispace - formally typeset
K

Kim-Kwang Raymond Choo

Researcher at University of Texas at San Antonio

Publications -  1089
Citations -  39064

Kim-Kwang Raymond Choo is an academic researcher from University of Texas at San Antonio. The author has contributed to research in topics: Cloud computing & Computer science. The author has an hindex of 80, co-authored 970 publications receiving 25517 citations. Previous affiliations of Kim-Kwang Raymond Choo include University of Sydney & Interpol.

Papers
More filters
Journal ArticleDOI

Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?

TL;DR: The potential to use the Blockchain technology to protect healthcare data hosted within the cloud and the practical challenges of such a proposition are described and further research is described.
Journal ArticleDOI

A blockchain future for internet of things security: a position paper

TL;DR: The potential for blockchain technology in facilitating secure sharing of IoT datasets and securing IoT systems is posited, before presenting two conceptual blockchain-based approaches.
Journal ArticleDOI

Blockchain in healthcare applications: Research challenges and opportunities

TL;DR: Concerns as blockchain technology has its own specific vulnerabilities and issues that need to be addressed, such as mining incentives, mining attacks, and key management are highlighted in this survey paper.
Journal ArticleDOI

A systematic literature review of blockchain cyber security

TL;DR: It is shown that the Internet of Things (IoT) lends itself well to novel blockchain applications, as do networks and machine visualization, public key cryptography, web applications, certification schemes and the secure storage of Personally Identifiable Information (PII).
Journal ArticleDOI

A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks

TL;DR: A novel model for intrusion detection based on two-layer dimension reduction and two-tier classification module, designed to detect malicious activities such as User to Root (U2R) and Remote to Local (R2L) attacks is presented.